Bluetooth is a wireless technology standard for exchanging data over short distances between fixed and mobile devices, creating personal area networks (PANs). It was created in 1994 by telecom vendor Ericsson. Bluetooth operates in the unlicensed 2.4 GHz short-range radio frequency band, using a frequency hopping spread spectrum technique to avoid interference. It defines a packet-based protocol with a master-slave structure, where one master communicates with up to 7 slaves in a piconet. Piconets can be connected to create larger scatternets. Bluetooth supports both point-to-point and point-to-multipoint connections.
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
Consortium: Ericsson, Intel, IBM, Nokia, Toshiba…
Scenarios:
connection of peripheral devices
loudspeaker, joystick, headset
support of ad-hoc networking
small devices, low-cost
bridging of networks
e.g., GSM via mobile phone - Bluetooth - laptop
Simple, cheap, replacement of IrDA, low range, lower data rates, low-power
Worldwide operation: 2.4 GHz
Resistance to jamming and selective frequency fading:
FHSS over 79 channels (of 1MHz each), 1600hops/s
Coexistence of multiple piconets: like CDMA
An overview of Bluetooth Smart (Low Energy) for Android. This was presented to the Android Australia User Group in March 2014 in Melbourne, Australia. We explore Bluetooth Smart advantages, support on Android devices, look at Apple's iBeacon technology and emerging Bluetooth smart services.
WLAN is a wireless computer network that links two or more devices (using-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
WLAN is a marketed under the Wi-Fi brand name.
Wireless LANs have become popular in the home due to ease of installation and use.
A Novel Solution To The Short Range Bluetooth Communication pijans
Bluetooth is developed for short range communication. Bluetooth Devices are normally having low power
and low cost. This is a wireless communication technology designed to connect phones, laptops and PDAs.
The greater availability of portable devices with Bluetooth connectivity imposes wireless connection
between enabled devices. On an average the range of Bluetooth devices is about 10 meters.The basic
limitation of the Bluetooth communication is this range limitation. In this paper I have studied the
limitations of Bluetooth communication and consider range constraint as the major limitation. I propose a
new expanded Blue tooth network to overcome the range constraint of Bluetooth device. This creates a
network of Bluetooth enabled devices that will include laptops, set top devices and also mobile phones. The
main purpose of this proposal is to establish a network will enable the users to communicate outside the
range without any range constraint.
Bluetooth Details
I run a knowledge sharing YouTube channel called (SILICON CHIPS TAMILAN). Please like, share, subscribe, and support me.
YouTube Link : https://www.youtube.com/channel/UCenZp9ho_PP0K5iYrdocvrw
Notes Link Below attached
https://siliconchipstamilan.blogspot.com/2022/12/what-is-outlook-mail.html
My YouTube chancel Link
https://www.youtube.com/channel/UCenZp9ho_PP0K5iYrdocvrw
My Facebook page Link
https://www.facebook.com/profile.php?id=100063722750309
&
https://www.facebook.com/profile.php?id=100063637014376
My Instagram ID
vignesh301992
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. INTRODUCTION
Bluetooth is a wireless technology standard for
exchanging data over short distances (using shortwavelength radio transmissions in the ISM band from
2400–2480 MHz) from fixed and mobile
devices, creating personal area networks (PANs) with high
levels of security.
Created by telecom vendor Ericsson in 1994,[2] it was
originally conceived as a wireless alternative to RS232 data cables. It can connect several
devices, overcoming problems of synchronization.
3. NAME AND LOGO
The word "Bluetooth" is an anglicised version of
the Scandinavian Blåtand/Blåtann, the epithet of
the tenth-century king Harald I of Denmark and
parts of Norwaywho united dissonant Danish
tribes into a single kingdom. The idea of this
name was proposed by Jim Kardach who
developed a system that would allow mobile
phones to communicate with computers (at the
time he was reading Frans Gunnar Bengtsson's
historical novel The Long Ships about Vikings and
king Harald Bluetooth).[5] The implication is that
Bluetooth does the same with communications
protocols, uniting them into one universal
standard.
4. IMPLEMENTATION
Bluetooth operates in the range of 2400–2483.5 MHz
(including guard bands).
This is in the globally unlicensed Industrial, Scientific and
Medical (ISM) 2.4 GHz short-range radio frequency band.
Bluetooth uses a radio technology called frequency-hopping
spread spectrum.
The transmitted data is divided into packets and each
packet is transmitted on one of the 79 designated Bluetooth
channels.
Each channel has a bandwidth of 1 MHz. The first channel
starts at 2402 MHz and continues up to 2480 MHz in 1 MHz
steps.
It
usually
performs
800
hops
per
second, with Adaptive Frequency-Hopping (AFH) enabled
5. Bluetooth is a packet-based protocol with a master-slave
structure. One master may communicate with up to 7 slaves
in a piconet; all devices share the master's clock. Packet
exchange is based on the basic clock, defined by the
master, which ticks at 312.5 µs intervals.
Two clock ticks make up a slot of 625 µs; two slots make up
a slot pair of 1250 µs. In the simple case of single-slot
packets the master transmits in even slots and receives in
odd slots; the slave, conversely, receives in even slots and
transmits in odd slots.
Packets may be 1, 3 or 5 slots long but in all cases the
master transmit will begin in even slots and the slave transmit
in odd slots.
Bluetooth provides a secure way to connect and exchange
information between devices such as faxes, mobile
phones,
telephones,
laptops,
personal
computers, printers, Global Positioning System (GPS)
receivers, digital cameras, and video game consoles.
6. COMMUNICATION AND CONNECTION
A master Bluetooth device can communicate with a maximum of seven
devices in a piconet (an ad-hoc computer network using Bluetooth
technology), though not all devices reach this maximum.
The devices can switch roles, by agreement, and the slave can become
the master (for example, a headset initiating a connection to a phone
will necessarily begin as master, as initiator of the connection; but may
subsequently prefer to be slave).
At any given time, data can be transferred between the master and one
other device (except for the little-used broadcast mode[citation needed]). The
master chooses which slave device to address; typically, it switches
rapidly from one device to another in a round-robin fashion.
Since it is the master that chooses which slave to address, whereas a
slave is (in theory) supposed to listen in each receive slot, being a
master is a lighter burden than being a slave. Being a master of seven
slaves is possible; being a slave of more than one master is difficult.
7. USES
Bluetooth is a standard wire-replacement communications protocol
primarily designed for low power consumption, with a short range
(power-class-dependent, but effective ranges vary in practice; see table
below) based on low-cost transceiver microchips in each
device.[10] Because the devices use a radio (broadcast) communications
system, they do not have to be in visual line of sight of each
other, however a quasi optical wireless path must be viable.
The effective range varies due to propagation conditions, material
coverage, production sample variations, antenna configurations and
battery conditions. In most cases the effective range of Class 2 devices
is extended if they connect to a Class 1 transceiver, compared to a pure
Class 2 network. This is accomplished by the higher sensitivity and
transmission power of Class 1 devices.
8. APPLICATIONS OF BLUETOOTH
1. Wireless control of and communication between a
mobile phone and a handsfree headset. This was one of
the earliest applications to become popular.
Wireless control of and communication between a mobile
phone and a Bluetooth compatible car stereo system
2. Wireless networking between PCs in a confined space
and where little bandwidth is required.
Wireless communication with PC input and output
devices,
the
most
common
being
the mouse, keyboard and printer.
3. Transfer of files, contact details,
appointments, and reminders between devices
calendar
9. 4. Personal security application on mobile phones for
prevention of theft or loss of items. The protected item has a
Bluetooth marker (e.g. a tag) that is in constant
communication with the phone. If the connection is broken
(the marker is out of range of the phone) then an alarm is
raised. This can also be used as a man overboard alarm. A
product using this technology has been available since
2009.
5. Roads Traffic division uses data collected from travelers'
Bluetooth devices to predict travel times and road
congestion for motorists.
6. Short range transmission of health sensor data from
medical devices to mobile phone, set-top box or
dedicated telehealth devices.
10. BLUETOOTH PROTOCOL
1. Bluetooth is a layered protocol architecture
Core protocols
Cable replacement and telephony control protocols
Adopted protocols
2. Core protocols
Radio
Baseband
Link manager protocol (LMP)
Logical link control and adaptation protocol (L2CAP)
Service discovery protocol (SDP).
3. Cable replacement protocol
RFCOMM
11. 4. Telephony control protocol
Telephony control specification – binary (TCS BIN)
5. Adopted protocols
PPP
TCP/UDP/IP
OBEX
WAE/WAP
Application
PPP
AT
Command
s
OBEX
Bluetooth
Radio
TCP/UDP
RFCOMM
TCS
L2CAP
HCI
Audio
Link Manager (LMP)
Baseband
Bluetooth Radio
SDP
12. BT Radio (2.4 GHZ Freq. Band):
Modulation: Gaussian Frequency Shift Keying
Baseband: FH-SS (79 carriers), CDMA (hopping sequence from the
node MAC address)
Audio: interfaces directly with the baseband. Each voice connection is
over a 64Kbps SCO link. The voice coding scheme is the Continuous
Variable Slope Delta (CVSD)
Link Manager Protocol (LMP): link setup and control, authentication and
encryption
Host Controller Interface: provides a uniform method of access to the
baseband, control registers, etc through USB, PCI, or UART
Logical Link Control and Adaptation Layer (L2CAP): higher protocols
multiplexing, packet segmentation/reassembly, QoS
Service Discover Protocol (SDP): protocol of locating services provided
by a Bluetooth device
Telephony Control Specification (TCS): defines the call control signaling
for the establishment of speech and data calls between Bluetooth
devices
RFCOMM: provides emulation of serial links (RS232). Upto 60
connections
13. PICONETS AND SCATTERNETS
1.Piconet
Basic unit of Bluetooth networking
Master and one to seven slave devices
Master determines channel and phase
2. Scatternet
Device in one piconet may exist as master or slave in
another piconet
Allows many devices to share same area
Makes efficient use of bandwidth
14. PICONETS
A piconet starts with two connected devices, and
may grow to eight connected devices. Bluetooth
communication always designates one of the
Bluetooth devices as a main controlling unit
or master unit. Other devices that follow the master
unit are slave units. This allows the Bluetooth system
to be non-contention based (no collisions). This
means that after a Bluetooth device has been added
to the piconet, each device is assigned a specific
time period to transmit and they do not collide or
overlap with other units operating within the same
piconet.
15. Piconet range varies according to the class of the
Bluetooth device. Data transfer rates vary between about
200 and 2100 kilobits per second.
Because the Bluetooth system hops over 79
channels, the probability of interfering with another
Bluetooth system is less than 1.5%.
This allows several Bluetooth Piconets to operate in the
same area at the same time with minimal interference.
16. SCATTERNETS
A scatternet is a type of adhoc
computer
network consisting of two or
more piconets. The terms
'scatternet' and 'piconet' are
typically
applied
toBluetooth
wireless
technology.
Scatternet
(master=red, slave=gree
n, parking=blue)
Piconets have a 3-bit address
space,
which
limits
the
maximum size of a piconet to 8
devices (23 = 8), i.e. 1 master
and 7 slaves.
17. A scatternet is a number of interconnected piconets that
supports communication between more than 8 devices.
Scatternets can be formed when a member of one
piconet (either the master or one of the slaves) elects to
participate as a slave in a second, separate piconet.
The device participating in both piconets can relay data
between members of both ad-hoc networks. However, the
basic bluetooth protocol does not support this relaying the host software of each device would need to manage
it.
18. Using this approach, it is possible to join together
numerous piconets into a large scatternet, and to expand
the physical size of the network beyond Bluetooth's limited
range.
Scatternets can also be used to enable ad-hoc
communication and interaction between autonomous
robots and other devices.
19. CONNECTION
At any given time, data can be transferred between the
master and one other device (except for the little-used
broadcast mode. The master chooses which slave device to
address; typically, it switches rapidly from one device to
another in a round-robin fashion. Since it is the master that
chooses which slave to address, whereas a slave is (in
theory) supposed to listen in each receive slot, being a
master is a lighter burden than being a slave.
Being a master of seven slaves is possible; being a slave of
more than one master is difficult. The specification is vague
as to required behavior in scatternets.
20. Bluetooth is a packet-based protocol with a master-slave
structure. One master may communicate with up to
7 slaves in a piconet; all devices share the master's clock.
Packet exchange is based on the basic clock, defined by
the master, which ticks at 312.5 µs intervals. Two clock
ticks make up a slot of 625 µs; two slots make up a slot
pair of 1250 µs.
In the simple case of single-slot packets the master
transmits in even slots and receives in odd slots; the
slave, conversely, receives in even slots and transmits in
odd slots. Packets may be 1, 3 or 5 slots long but in all
cases the master transmit will begin in even slots and the
slave transmit in odd slots.
22. NETWORK TOPOLOGY
Slave Master
Piconet 1
Piconet 2
Master
Scatternet
Piconet = set of Bluetooth nodes synchronized to a
master node
The piconet hopping sequence is derived from the
master MAC address (BD_ADDR IEEE802 48 bits
compatible address)
Scatternet = set of piconet
Master-Slaves can switch roles
23. BLUETOOTH VS WIFI
Bluetooth and Wi-Fi (the brand name for products
using IEEE 802.11 standards) have some similar
applications: setting up networks, printing, or transferring
files. Wi-Fi is intended as a replacement for cabling for
general local area network access in work areas. This
category of applications is sometimes called wireless local
area networks (WLAN).
Bluetooth was intended for portable equipment and its
applications. The category of applications is outlined as the
wireless personal area network (WPAN).
24. Bluetooth is a replacement for cabling in a variety of
personally carried applications in any setting and also
works for fixed location applications such as smart energy
functionality in the home (thermostats, etc.).
Wi-Fi
is
a
wireless
version
of
a
common
wired Ethernet network, and requires configuration to set
up shared resources, transmit files, and to set up audio
links (for example, headsets and hands-free devices). Wi-Fi
uses the same radio frequencies as Bluetooth, but with
higher power, resulting in higher bit rates and better range
from the base station.
25. BLUETOOTH DEVICES AND PC
Bluetooth
exists
in
many
products,
such
as
telephones, tablets, media players, the Nintendo Wii, and
some
high
definition
headsets,
modems,
and
watches.[19] The technology is useful when transferring
information between two or more devices that are near each
other in low-bandwidth situations.
Bluetooth is commonly used to transfer sound data with
telephones (i.e., with a Bluetooth headset) or byte data with
hand-held computers (transferring files).
26. A personal computer that does
not have embedded Bluetooth
can be used with a Bluetooth
adapter that will enable the PC
to communicate with other
Bluetooth devices (such as
mobile
phones, mice and keyboards).
A typical Bluetooth
USB dongle.
While
some
desktop
computers and most recent
laptops come with a built-in
Bluetooth radio, others will
require an external one in the
form of a dongle.
27. RADIO SPECIFICATIONS
Classes of transmitters
Class 1: Outputs 100 mW for maximum range
Power control mandatory
Provides greatest distance
Class 2: Outputs 2.4 mW at maximum
Power control optional
Class 3: Nominal output is 1 mW
Lowest power
Frequency Hopping in Bluetooth
Provides resistance to interference and multipath
effects
Provides a form of multiple access among co-located
devices in different piconets
28. FREQUENCY HOPPING
Total bandwidth divided into 1MHz physical channels
FH occurs by jumping from one channel to another in
pseudorandom sequence
Hopping sequence shared with all devices on piconet
Piconet access:
Bluetooth devices use time division duplex (TDD)
Access technique is TDMA
FH-TDD-TDMA
29. Frequency-hopping spread spectrum (FHSS) is a
method of transmitting radio signals by rapidly switching
a carrier among many frequency channels, using
a
pseudorandom
sequence
known
to
both transmitter and receiver. It is utilized as a multiple
access method in the frequency-hopping code division
multiple access (FH-CDMA) scheme.
31. VERSIONS OF BLUETOOTH
All versions of the Bluetooth standards are designed for
downward compatibility.
Bluetooth v1.0 and v1.0B
Versions 1.0 and 1.0B had many problems, and
manufacturers had difficulty making their products
interoperable. Versions 1.0 and 1.0B also included
mandatory
Bluetooth
hardware
device
address
(BD_ADDR) transmission in the Connecting process
(rendering anonymity impossible at the protocol
level), which was a major setback for certain services
planned for use in Bluetooth environments.
32. Bluetooth v1.1
Ratified as IEEE Standard 802.15.1–2002[28]
Many errors found in the 1.0B specifications were fixed.
Added possibility of non-encrypted channels.
Received Signal Strength Indicator (RSSI).
Bluetooth v1.2
This version is backward compatible with 1.1 and the
major enhancements include the following:
Faster Connection and Discovery
33. Adaptive frequency-hopping spread spectrum (AFH), which
improves resistance to radio frequency interference by
avoiding the use of crowded frequencies in the hopping
sequence.
Higher transmission speeds in practice, up to 721
kbit/s,[29] than in v1.1.
Bluetooth v2.0 + EDR
This version of the Bluetooth Core Specification was released
in 2004 and is backward compatible with the previous version
1.2.
34. The main difference is the introduction of an Enhanced Data
Rate (EDR) for faster data transfer. The nominal rate of EDR
is about 3 Mbit/s, although the practical data transfer rate is
2.1 Mbit/s.
Bluetooth v2.1 + EDR
Bluetooth Core Specification Version 2.1 + EDR is fully
backward compatible with 1.2, and was adopted by the
Bluetooth SIG on 26 July 2007.[31]
The headline feature of 2.1 is secure simple pairing (SSP):
this improves the pairing experience for Bluetooth
devices, while increasing the use and strength of security.
35. Bluetooth v3.0 + HS
Version 3.0 + HS of the Bluetooth Core Specification[31] was
adopted by the Bluetooth SIG on 21 April 2009. Bluetooth
3.0+HS provides theoretical data transfer speeds of up to 24
Mbit/s, though not over the Bluetooth link itself. Instead, the
Bluetooth link is used for negotiation and establishment, and
the high
data rate traffic is carried over
a
collocated 802.11 link.
36. Bluetooth v4.0
The Bluetooth SIG completed the Bluetooth Core
Specification version 4.0 and has been adopted as of 30
June 2010. It includes Classic Bluetooth, Bluetooth high
speed and Bluetooth low energyprotocols. Bluetooth high
speed is based on Wi-Fi, and Classic Bluetooth consists of
legacy Bluetooth protocols.
Bluetooth low energy (BLE), previously known as
WiBree,[44] is a subset to Bluetooth v4.0 with an entirely new
protocol stack for rapid build-up of simple links.
37. OVERVIEW
The National Institute of Standards and Technology (NIST)
published a Guide to Bluetooth Security that will serve as
reference to organizations on the security capabilities of
Bluetooth and steps for securing Bluetooth technologies
effectively.
While Bluetooth has its benefits, it is susceptible to denialof-service attacks, eavesdropping, man-in-the-middle
attacks,
message
modification,
and
resource
misappropriation.
38. Users/organizations must evaluate their acceptable level of
risk and incorporate security into the lifecycle of Bluetooth
devices.
To help mitigate risks, included in the NIST document are
security checklists with guidelines and recommendations for
creating
and
maintaining
secure
Bluetooth
piconets, headsets, and smart card readers.[